Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Results
212 Total
0.0

UN Peacekeeping in Sub-Saharan Africa: A Growth Industry

Document

Release Date: 2016-12-07 Document Date: 2004-03-16
An article describes the current state of U.N. peacekeeping operations in sub-Saharan Africa and predicts growth in missions and personnel. There is no mention of NSA or SID participation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) UN Peacekeeping in Sub-Saharan Africa: A Growth Industry<br>FROM:<br>Deputy SIN...
0.0

CATAPULT: A Bilateral Data Port

Document

Release Date: 2016-05-16 Document Date: 2003-05-08
This describes CATAPULT, a prototype of a data portal for sharing SIGINT product between NSA and second-party partners, based on a Canadian project that uses an XML-based standard format.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(C//SI) CATAPULT: A Bilateral Data Port<br>FROM:<br>Deputy Chief, Customer Relations...
0.0

PHANTOM PARROT

Document

Release Date: 2017-09-23 Document Date: 2009-05-27
This page from GCHQ’s internal GCWiki, dated 27 May 2009 describes a system for querying mobile phone information acquired during port stops: see the Intercept article Airport Police Demanded An Activist’s Passwords. He Refused. Now He Faces Prison In The UK, 23 September 2017.
UK SECRET The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam RUSSETT Support page PHANTOM PA...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

The National Technical Assistance Centre

Document

Release Date: 2016-06-07 Document Date: 2010-06-22
This presentation from NTAC, part of GCHQ, dated 22 June 2010 provides an introduction to the work of the centre: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
The National Technical Assistance Centre NTAC Programme Manager 22nd June 2010 National. Technical Assistance Centre SECRET NTAC NTAC mission • Facilitate access to warranted vo...
0.0

Communications Capability Development Programme

Document

Release Date: 2016-06-07 Document Date: 2012-01-01
This page from GCHQ’s internal GCWiki outlines the agency’s approach to maintaining the UK’s “lawful intercept” capability: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam . Support page ...
0.0

Introduction to XKS Application IDs and Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...
0.0

CNE Analysis in XKeyScore

Document

Release Date: 2015-07-01 Document Date: 2009-10-15
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in XKEYSCORE 15 October 2009 xkeyscore@nsa.ic.gov l@nsa.ic.gov) y >M 1-5 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED F ROM: Ñ WCSSM 1-52 DATED: 2...
0.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Release Date: 2015-06-22 Document Date: 2008-01-01
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
0.0

Welcome to the Mission Driven Access Workshop – GCHQ Bude

Document

Release Date: 2015-04-02 Document Date: 2011-11-01
This GCHQ slide from a November 2011 workshop presentation gives a Falklands-themed Latin American scenario for attendees to discuss: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
CONFIDENTIAL Welcome to the Mission Driven Access Workshop GCHQ Bude This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption ...
0.0

Mobile Apps – Checkpoint meeting Archives

Document

Release Date: 2016-06-07 Document Date: 2012-05-01
This page from GCHQ’s internal GCWiki, last updated on 1 May 2012 documents progress in a variety of the agency’ projects: see Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam Support page Mob...
0.0

S455N – Israeli UAV Digital Video

Document

Release Date: 2016-01-29
This undated GCHQ report from the agency’s Cyprus (GOLF) division, describes, in technical data, the S455N signals sent out by Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET STRAP1 SPOKE sigint.development S455N - Israeli UAV Digital Video Golf Section, JSSU(CYP) Analyst: 1 of 7 This information is exempt from disclosure under the Freedom ...
0.0

Second Party National Identity Rules, continued

Document

Release Date: 2015-03-08 Document Date: 2012-01-01
This extract from a 2012 NSA document detailing how different Five Eyes countries define their own nationals shows that the GCSB allowed itself the right to surveil the governments of the Cook Islands and Nuie “but not their citizens”: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
SECRET//COMINT//REL TO USA, FVEY (U) Second Party National Identity Rules, Continued Section B.4. - (U) New Zealand: Government Communications Security Bureau (GCSB) B.4.1. (U) Governmen...
0.0

DAPINO GAMMA Target Personalisation Centres

Document

Release Date: 2015-02-19 Document Date: 2011-01-01
This 2011 Wiki page details aspects of GCHQ’s DAPINO GAMMA operation against mobile SIM manufacturer Gemalto: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
[edit] Target Personalisation centres ( non 5 eyes): [edit] France • La Ciotat • Meudon - On outskirts of Paris • PontAudemer [edit] Poland Tczew [edit] Czech Republic [edit]...
0.0

LOVELY HORSE

Document

Release Date: 2015-02-04 Document Date: 2012-02-06
This page from GCHQ’s internal GCWiki, last updated on 6 February 2012, describes progress on LOVELY HORSE, a tool that automates the monitoring of open-source information related to information security: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
TOP SECRET STRAP1 COMINT The maximum classification allowed or i GCWiki is TOP SFf’RFT STR4P1 COMINT Click to report inappropriate content 1 1 J _U k-k- LOVELY HORSE From GC Wiki Ju...
0.0

Sensitive Metadata Analytic Collaboration (SMAC) Concept of Operations

Document

Release Date: 2018-03-01 Document Date: 2006-10-01
This NSA briefing from October 2006 underlines how the Alice Springs Resolution of 2004, designed to allow “unfettered” metadata sharing within the Five Eyes, was put into action in the aftermath of the 7/7 London bombings, with procedures for use of the resulting SMAC system: see the Intercept article How London’s 7/7 Bombings Led to […]
SECRET//REL TO USA, AUS, CAN, GBR, NZL//22012031 Sensitive Metadata Analytic Collaboration (SMAC) Concept of Operations October 2006 Background In June 2004 via the Alice Springs Resolut...
0.0

Contact Chaining

Document

Release Date: 2018-03-01
This undated GCHQ presentation, which includes speaking notes, outlines different techniques for contact chaining – moving from one contact to find all those associated with it: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
SECRET STRAP 1 Slide 15 © Crown Copyright. All rights reserved. This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under oth...
0.0

A potential technique to deanonymise users of the TOR network (proposal)

Document

Release Date: 2014-12-28 Document Date: 2011-06-13
This GCHQ paper dated 13 June 2011 proposes an attack to deanonymise Tor users: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT Reference: OPC-M/TECH.B/61 Date: 13 June 2011 Copy no: A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ Summary A new techn...
0.0

Data Stored in BLACK HOLE

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki provides technical information about the agency’s BLACK HOLE repository: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
data-stored-in-black-hole-p1-normal.gif: TOP SECRET STRAP 1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWi...
0.0

Laws on interception – Oversight – Implications for JCE

Document

Release Date: 2015-09-25
This undated GCHQ presentation includes, in its speakers notes, the statements that “We have a light oversight regime compared to [the] US” and “judicial oversight… [is] the main issue for us”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
jce-uk-legality-context-p1-normal.gif: èâ Laws on interception Oversight Implications for JCE ^GCHQi This intormaton is exempt und« the Freedom ol ln(Ofina!iOf^^00^roiA^n^n3W> legis...
0.0

Voice/Fax User Group Minutes of October 2008 meeting

Document

Release Date: 2018-01-19 Document Date: 2008-10-01
These GCHQ minutes from October 2008 describes how the agency and its partners can re-use voice recognition data in different situations: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET STRAP1 Speaker identification systems (SID^ Result: A couple of months ago we deployed a 5-way speaker id system against a network of high level individuals involved with the A...
0.0

National Information Assurance Research Laboratory (NIARL) Newsletter – September 2008

Document

Release Date: 2014-12-28 Document Date: 2008-09-01
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 September 2008 Edition ■ (U) Message from the NIARL Director: (U//FOUO) Welcome to the September 2008 edition of the National ...
0.0

Crypt Discovery Joint Collaboration Activity

Document

Release Date: 2014-12-28 Document Date: 2011-01-20
This document dated 20 January 2011 provides the research agenda for a joint NSA/GCHQ group tasked with developing “a sound understanding of the threat that encryption brings to our ability to do target discovery/development as well as devising mitigations”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December […]
TOP SECRET Crypt Discovery Joint Collaboration Activity 20 January 2011 Activity Owners [NSA GCHQ Overview Our Internet Exploitation capability is built upon our ability to eff...
0.0

Crypt Ops Data Store User Guide

Document

Release Date: 2014-12-28
This undated GCHQ document provides guidance for analysts on how to handle encrypted data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
SECRET Crypt Ops Data StoreUserGuide Crypt Ops Datastore DataStore Rota: -Data Store to be reviewed weekly at the DataStore management meeting The Tasking Process Submitting a Ta...
0.0

GCHQ NAC Business Review – January to March 2012

Document

Release Date: 2014-12-13 Document Date: 2012-01-01
This extract from a 2012 GCHQ document details progress in the operation against Belgian telecommunications company Belgacom in the first quarter of 2012: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
CNE Access to BELGACOM GRX Operator: (GREEN) This work continues to be very productive with the CNE EREPO team providing new requirements for the NAC to help steer and support their operation.
0.0

GCHQ NAC Business Review – April to June 2011

Document

Release Date: 2014-12-13 Document Date: 2011-02-01
This extract from a 2011 GCHQ document details progress in the operation against Belgian telecommunications company Belgacom in the second quarter of 2011: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
CNE Access to BELGACOM GRX Operator: (GREEN) Following the successful NAC MyNOC OP SOCIALIST to provide CNE access to the BELGACOM GRX Operator (MERION ZETA), the NAC have continued to provide a...
0.0

Mobile Networks in MyNOC World

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This GCHQ presentation from 2011 provides the background to the agency’s hacking attack on Belgacom: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. gchq-mobile-networks-in-my-noc-world
TOP SECRET STRAP 2 Mobile Networks in World Head of GCHQ NAC n/\c This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptio...
0.0

Automated NOC Detection

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This 2011 presentation, created by GCHQ’s Network Analysis Centre describes new techniques for gathering reconnaissance on the IT personnel of targeted organisations (their “Network Operations Centres”), using Belgacom as an example in several slides: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. Download […]
TOP SECRET STRAP 2 Automated NOC Detection , Head of GCHQ NAC Senior Network Analyst, CSEC NAC n/\c This information is exempt from disclosure under the Freedom of Information Act ...
0.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh